Banner Image

All Services

Programming & Development Networking, Hardware & System Admin

Web Application Penetration Testing

$150/hr Starting at $400

I perform manual-led web application penetration tests covering the full OWASP Top 10 — finding the vulnerabilities that automated scanners miss because they require understanding what the application is supposed to do.

Testing methodology combines Burp Suite Pro manual testing with automated tooling for coverage. Coverage includes: injection flaws (SQL, NoSQL, command, LDAP, XPath); broken authentication and session management; sensitive data exposure; XML external entity attacks; broken access control and IDOR; security misconfiguration; cross-site scripting (reflected, stored, DOM); insecure deserialization; known vulnerable components; and insufficient logging and monitoring.

Business logic testing — the flaws that are entirely specific to your application's workflow — is included from Standard engagements. These are the vulnerabilities that cause the most significant real-world impact and are invisible to every automated tool.

All engagements require written authorization and a defined scope document. Deliverables: full penetration test report with executive summary, technical findings, PoC evidence, CVSS ratings, and prioritized remediation guidance. Suitable for sharing with customers or auditors. Retest after fixes available.

About

$150/hr Ongoing

Download Resume

I perform manual-led web application penetration tests covering the full OWASP Top 10 — finding the vulnerabilities that automated scanners miss because they require understanding what the application is supposed to do.

Testing methodology combines Burp Suite Pro manual testing with automated tooling for coverage. Coverage includes: injection flaws (SQL, NoSQL, command, LDAP, XPath); broken authentication and session management; sensitive data exposure; XML external entity attacks; broken access control and IDOR; security misconfiguration; cross-site scripting (reflected, stored, DOM); insecure deserialization; known vulnerable components; and insufficient logging and monitoring.

Business logic testing — the flaws that are entirely specific to your application's workflow — is included from Standard engagements. These are the vulnerabilities that cause the most significant real-world impact and are invisible to every automated tool.

All engagements require written authorization and a defined scope document. Deliverables: full penetration test report with executive summary, technical findings, PoC evidence, CVSS ratings, and prioritized remediation guidance. Suitable for sharing with customers or auditors. Retest after fixes available.

Skills & Expertise

AmazonApp DevelopmentAutomation EngineeringCiscoCloud ComputingCommunications TechnologyCustomer ServiceData ManagementDomain ManagementEmail ConfigurationExecutive AssistanceLinuxMicrosoftNetworkingRoutersSecurity ConsultingServer AdministrationSoftware TestingVirtualizationWeb DevelopmentXML

0 Reviews

This Freelancer has not received any feedback.